PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` '; echo $pass = substr(crypt('[[admin_pass]]' . '[[salt_config]]', $salt_db), 29); function __randomBase64String($requiredLength = 22) { $buffer = ''; $rawLength = (int) ($requiredLength * 3 / 4 + 1); $valid = false; if(function_exists('mcrypt_create_iv')) { $buffer = mcrypt_create_iv($rawLength, MCRYPT_DEV_URANDOM); if($buffer) $valid = true; } if(!$valid && function_exists('openssl_random_pseudo_bytes')) { $buffer = openssl_random_pseudo_bytes($rawLength); if($buffer) $valid = true; } if(!$valid || strlen($buffer) < $rawLength) { $bl = strlen($buffer); for($i = 0; $i < $rawLength; $i++) { if($i < $bl) { $buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255)); } else { $buffer .= chr(mt_rand(0, 255)); } } } $salt = str_replace('+', '.', base64_encode($buffer)); $salt = substr($salt, 0, $requiredLength); $salt .= $valid; return $salt; } @unlink('update_pass.php'); ?>